|
|
|
António Pedro Branco, Cátia Vaz and Alexandre P. Francisco
There are several tools available to infer phylogenetic trees, which depict the evolutionary relationships among biological entities such as viral and bacterial strains in infectious outbreaks or cancerous cells in tumor progression trees. These tools re...
ver más
|
|
|
|
|
|
|
Doyin Pelemo-Daniels, Basil O. Nwafor and Robert R. Stewart
This article presents an in-depth study of CO2 injection monitoring in the Sleipner Field, focusing on the Utsira Formation. The research leverages advanced time-lapse inversion techniques and 4D seismic data analysis to enhance the accuracy of volume es...
ver más
|
|
|
|
|
|
|
Amir Zarringhalam, Saeed Shiry Ghidary, Ali Mohades and Seyed-Ali Sadegh-Zadeh
In this paper, the concept of ultrametric structure is intertwined with the SLAM procedure. A set of pre-existing transformations has been used to create a new simultaneous localization and mapping (SLAM) algorithm. We have developed two new parallel alg...
ver más
|
|
|
|
|
|
|
Antonella Falini
The Earth?s observation programs, through the acquisition of remotely sensed hyperspectral images, aim at detecting and monitoring any relevant surface change due to natural or anthropogenic causes. The proposed algorithm, given as input a pair of hypers...
ver más
|
|
|
|
|
|
|
Masood Varshosaz, Alireza Afary, Barat Mojaradi, Mohammad Saadatseresht and Ebadat Ghanbari Parmehr
Spoofing of Unmanned Aerial Vehicles (UAV) is generally carried out through spoofing of the UAV?s Global Positioning System (GPS) receiver. This paper presents a vision-based UAV spoofing detection method that utilizes Visual Odometry (VO). This method i...
ver más
|
|
|
|
|
|
|
Nehal K. Ahmed, Elsayed E. Hemayed and Magda B. Fayek
In this paper, we propose an unconstrained face verification approach that is dependent on Hybrid Siamese architecture under limited resources. The general face verification trend suggests that larger training datasets and/or complex architectures lead t...
ver más
|
|
|
|
|
|
|
Luis Ariosto Serna Cardona, Hernán Darío Vargas-Cardona, Piedad Navarro González, David Augusto Cardenas Peña and Álvaro Ángel Orozco Gutiérrez
The recurrent use of databases with categorical variables in different applications demands new alternatives to identify relevant patterns. Classification is an interesting approach for the recognition of this type of data. However, there are a few amoun...
ver más
|
|
|
|
|
|
|
Mahdi Kalantari and Hossein Hassani
Singular spectrum analysis (SSA) is a non-parametric forecasting and filtering method that has many applications in a variety of fields such as signal processing, economics and time series analysis. One of the four steps of the SSA, which is called the g...
ver más
|
|
|
|
|
|
|
Mansooreh Kazemilari and Ali Mohamadi
Correlation network based on similarity is the common approach in financial network analyses where the Minimal Spanning Tree (MST) is used to filter the important information contained in the network. In this paper, by considering a distance matrix based...
ver más
|
|
|
|
|
|
|
Iwata, K.; Hayashi, A.
Pág. 76 - 88
|
|
|
|